Showing posts with label Web Hosting. Show all posts
Showing posts with label Web Hosting. Show all posts

How to make Web filenames

How to make Web filenames

When you tell a Windows program and hosting to save
your file as a text document, it saves just the
actual text characters that you see onscreen, without any formatting commands.
The Windows program also assigns the suffix
.txtto the file, unless you tell it otherwise and web database .


The filename’s suffix, which is usually
hidden from you by Windows, helps
Windows figure out what kinds of programs
the file “belongs” to. When you name your
file with the suffix .htm, it overrides the
.txtsuffix that Windows would otherwise
assign to a file that’s saved as text.

When your file ends in .htm, Windows recognizes it as an HTML file. This extension
allows you to easily open the file from a Web
browser program such as Internet Explorer.
By doing this, you can preview your file as
you work on it — and, more importantly,
other people can open your file as a Web
page when you put it on a Web server.
You may also see some Web pages with filenames ending in .html; this suffix works
on most Web servers. However, you should
not end the filenames of your Web pages
with .html.

Not putting spaces in your Web filenames
and using only lowercase letters in the filenames is also important. Why? Because
your Web page may be published on a UNIX
server, or on a server that runs an old version
of Windows. Different servers have different
filename rules. Only a filename with a main
part of eight characters or less, with .htm
as its suffix, and with no uppercase characters, spaces, or other special characters is
sure to stay intact and accessible when you
publish your Web page onto a Web server.


You should also keep your folder names all lowercase, for the same reasons. If your folder name
changes when you transfer your Web page to a
server for publication, links to the Web pages
and graphics files in the folder can be broken.
Nothing is more frustrating — or embarrassing,
especially if you’re creating a Web page for a
company or other organization — than having
your hyperlinks break when you move your Web
site from your own machine to a Web server.

AdSense and Search Engine Optimization



Search engine optimization is a lot

like trying to catch the steam that you
breathe on a cold winter day. You can see it. You know it exists, but there’s
no way to actually contain and quantify the steam. You can see the results
of SEO and you can figure out how best to achieve it, but it’s still possible to
do everything right and not achieve the ultimate goal — landing the very first
listing on a search engine results page, or SERP.
Good news though, you don’t necessarily want to be the very top listing on a
SERP. Think about this — how often do you click the first search result and
not go any farther? Even if you find exactly what you’re looking for on the
first page you jump to, you still click through some of the other results just
to make sure the first page isn’t lying to you.
As a general rule, I go through the listings of about ten results pages, just to
make sure I’m getting the best info. Admittedly, I may be a little more patient
than your average searcher. Most people don’t go much deeper than the
second page of results. Because you should probably be targeting your Web
site to normal folks rather than obsessive-compulsive types like me, you want
your Web site to fall somewhere on the first or second page of results. If it
does, you’re fine — you can count your search marketing efforts a success,
even if your site isn’t at the very tippy-top of the first SERP.

The crawler uses a very lengthy and complicated algorithm as its search
formula. The algorithm compares the number of times a keyword is used to
indicators that tell it if that keyword is important on the Web site. Like color
coding, that algorithm makes it possible to define a Web site in terms of how
it relates to a specific topic.
Algorithmsin general are computer programs that systematically solve problems
 such as determining how many times a keyword is used on a Web site.
They’re complicated creatures, highly technical in nature, and they are a
search engine’s lifeblood — which is why they’re so jealously guarded. Just
try to pry Google’s secret algorithm from their tightly clenched fist and see
where that gets you.
The crawler takes a stab at what your Web site’s all about by registering the
site’s keywords. The crawler then takes another look at the site, this time
considering those keywords in the context of the Web site

Getting the number-one keyword down is like
shooting fish in a barrel, but you can’t stop there. You need a larger pool of
keywords to get you started. If you keep brainstorming additional words,
you’ll probably come up with the following keywords:
Search engine
Search
Marketing
List
Link
Linking strategy
Alt tags
Metatags
Metadata
Media
Content
Social media
That’s just the short list. If you really put some time into brainstorming the
SEO topic, you could come up with a couple hundred words. And don’t forget
phrases, too — up to three words. They’re more useful and help you target
better than just single words.

The CPC,or cost-per-click,is the amount that it costs an advertiser every
time one of their ads based on that keyword is clicked. That amount is
paid to Google, which then distributes portions of the money to AdSense
publishers that allow those ads to be shown on their Web sites. Of
course, Google keeps a fair chunk of it to line its own pockets, too.

Server-Based Anti-Spam



The single biggest hurdle

when hosting your own e-mail addresses is filtering spam. If you have an account with Gmail, Yahoo! Mail, or one of the other many free e-mail providers, it is almost certainly filtered for junk and viruses by some pretty sophisticated software.

When you first create your own hosted addresses in your control panel, they
most likely have no filters on them at all, which can make for a messy — and
dangerously vulnerable — e-mail account.

Most web hosts provide optional spam filters that you have to turn on and
configure yourself.

These different spam filters work in different ways and require some monitoring
and configuration, but they will help you greatly reduce the amount of spam you receive.

Many filters are available. BoxTrapper and SpamAssassin are two of the most
common filters.

Find your options by logging in to your control panel and looking for the Mail
section. In that section, if your host provides them, you will see some spam
protection options.

On cPanel, for example, BoxTrapper and SpamAssassin are almost always
installed. Here’s how they work.

BoxTrapper prevents any e-mail address from sending mail to you unless it is
on a whitelist.

A whitelist is a list of allowed e-mail addresses. Users can also create a blacklist that contains banned e-mail addresses. The same terms are used to apply
to IP addresses when dealing with website security.

E-mail addresses can get onto a BoxTrapper whitelist in two ways:
 You manually add them to the list  The senders verify they are real.

BoxTrapper sends an e-mail to any unverified senders asking them to
respond to prove that they are legitimate senders. Spammers who send out
e-mails automatically en masse using fake e-mail addresses can’t reply to the
verification message, and BoxTrapper will block messages that come from
those addresses. See Figure 3-10 for the BoxTrapper Configuration screen.
BoxTrapper holds blocked e-mails in a queue for moderation, so you have to
remember to log in periodically and check for legitimate e-mails that
inadvertently have been blocked. This can be a pain to do, especially if you get large
quantities of junk and have to pick through the junk in the queue to find real,
non-spam messages.

Web Hosting or DNS

It is common sense that if a web site is down it cannot get spidered, but we’ll state it regardless:
When a site is down, it cannot get spidered.And when your domain’s designated DNS is down, your
site cannot get spidered either — even if your web server is up. Reliable hosting and DNS, then, is
critical to your web site’s well-being. A web site that is down will irritate users and result directly
in fewer users visiting your web site. It may also reflect badly on your business, and users may not
be back. Likewise, if a search engine spider visits your web site and it does not respond after quite
a few unsuccessful attempts, it may result in your web site getting dropped from the index. For
this reason we recommend cutting costs elsewhere.

Most of the time, users opt to use a web hosting provider’s DNS. This may be wise, because they may
need to alter DNS records in order to move you to another server with another IP if the server your
web site is located on fails. However, domain providers (Network Solutions, GoDaddy, and so on)
have more recently begun to offer free managed DNS services as well. If you use managed DNS,
the hosting provider will not be able to change your domain’s records to reflect the new IP, and
your site will be down as a result. For this reason, we do not recommend using managed DNS
unless your provider is aware of it, and knows to notify you, so that you can change the records
yourself to reflect the new IP.

Hosting Providers

Should the need exist to change hosting providers, the process must be completed in the proper order.
Not doing so may result in a time window where your site is unreachable; and this is clearly not desirable,
from both a general and SEO perspective. The focus of this elaborate process is to prevent both users and
search engines from perceiving that the site is gone — or in the case of virtual hosting, possibly seeing the
wrong site.
Virtual hosting means that more than one web site is hosted on one IP. This is commonplace,
because the world would run out of IPs very quickly if every web site had its own IP. The problem
arises when you cancel service at your old web hosting provider and a spider still thinks your site
is located at the old IP. In this case, it may see the wrong site or get a 404 error; and as you suspect,
this is not desirable.
The proper approach involves having your site hosted at both hosting providers for a little while. When
your site is 100% functional at the new hosting provider, DNS records should then be updated.

Functionality was also used to set up the seophp.example.comdomain. On Windows machines,
the file is located in C:\WINDOWS\system32\drivers\etc\hosts.
Add the following lines:
xxx.xxx.xxx.xxx www.yourdomain.com
xxx.xxx.xxx.xxx yourdomain.com
This will let you access your web site at the new provider as if the DNS changes were already reflected.
Simply remove the lines after you are done setting up the site on the new web hosting provider’s server
to verify the changes have actually propagated.
If you have concerns about this procedure, or you need help, you may want to contact your new hosting
provider and ask for assistance. Explain your concerns, and hopefully they will be able to accommodate
you and put your mind at ease. If they are willing to work with you, it is a good indication that they are
a good hosting provider.

MSN Search has a useful feature that allows you to see all virtual hosts on one IP by the syntax of
IP:xxx.xxx.xxx.xxx. Multiple statements can be separated by ORto request a list of a range of IPs.
This lets you see who else is hosting in a range. Spam tends to travel in packs. Search engine algorithms are also aware of this. The fact that the operator exists may be a tacit admission by Microsoft
that it does examine the sites in an IP range for some reason.

Securing FTP-How

 Securing FTP
You can make your FTP uploads and downloads more secure in one of two
ways: through Secure File Transfer Protocol SFTP or Transport Layer
Security TLS.

SFTP
SFTP is a more secure way of uploading and downloading files than FTP.
When you use FTP, data is sent unencrypted, so someone who intercepts the
data can easily read it. SFTP encrypts the commands and the data to provide
a much more secure form of transport.

To use SFTP (also known as secure FTP or SSH file transfer protocol), your
host has to have configured the server to be able to accept a secure connection from you. Most shared hosts do not allow this because giving clients SSH
access opens doors for clients to get into areas of the server that the host
does not want them messing with.

The FTP and SFTP protocols work quite differently, and your host needs to
have opened a specific port and allowed you SSH login permission to be able
to connect with SFTP. If you do have SFTP access, the following steps show
how to make a connection using FileZilla. Other clients may differ slightly in
layout but require that you enter the same information

1. In your FTP client, select File➪Site Manager and create a new site.
2. Select the Protocol drop-down box and click SFTP.
The Site Manager dialog box opens, as shown in Figure 4-4.
3. Enter the Host name, Username, and Password, which are normally
the same as you would use with FTP.
4. Enter the correct setting in the Port field.
5. Click Connect and your client attempts to negotiate a secure connection.
If the client cannot connect, check with your host to confirm whether it
allows SFTP connections.
TLS
TLS offers a similar level of security to SFTP but is favored more highly by
hosts because it does not require that the client have SSH access to the
server.

The following steps describe how to connect using TLS and FileZilla:
1. Choose File➪Site Manager and create a new site or select an
existing one.
2. Enter your FTP details as normal.
www.it-ebooks.info
69 Chapter 4: Managing Files
3. Click in the Encryption drop-down box (see Figure 4-5) and select
either Explicit TLS or Implicit TLS.
See the “Explicit TLS versus Implicit TLS” sidebar for more information.
4. Connect as normal.

Setting and managing file permissions

File permissions are a powerful security tool created to give the server
administrator the capability to define exactly who can read, write, and execute any given file.
Each file has its own permissions, which are either expressed in a textual
form drwxrwxrwx or in numerical form, such as 755.
permissions shown in three-digit format in FileZilla.
The permissions are set for
 The owner:Usually the owner is the creator of the file, but that can be
changed, if necessary.

 The group:Groups are set up in UNIX/Linux to manage permissions.
Each user can be added to multiple groups, and each file can be in one
group. This enables you to restrict who has access to the file.

The public:Anybody who has access to the system is classed as a
member of the public group. That means all users are in the public group.

Session Hijacking-Protection

Session hijacking isn't new to computer security. The term is most commonly used to describe the process of a TCP connection taken over by a sequence prediction attack. In such an attack, the attacker gains control of an already established TCP connection. When applied to Web application security, session hijacking refers to the takeover of a Web application session.

HTTP is a stateless protocol with its origins in information dissemination. Clients request a particular resource, which eventually is delivered by the server hosting that particular resource. The goal of the World Wide Web in its early days was to provide a uniform medium of information dissemination via HTTP and rendering of the information via HTML. The information could also be cross-referenced by using hyperlinks. As time went by, servers were developed with the ability to handle dynamically generated content and execute programs that generated HTML. Soon enough, the need for interactivity increased. Because of its ability to handle text and graphics, the browser took the place of a universal client. Small-scale applications began to be hosted on Web servers with the use of CGI scripting, which extended the ability of universal participation to all Internet users who had a browser. No longer was an underlying operating system an issue. So long as you had a browser, you could use the application. Application development went from a central mainframe–terminal based concept to the client-server model, and back to the central Web server–browser based concept again.

These days, Web application servers host complex applications, such as an entire office productivity suite. Microsoft Outlook for the Web is an example of delivering a fully featured e-mail client over a Web browser. Lotus Domino servers provide a Web interface that lets users perform more or less the same tasks as can be performed via a Lotus Notes client.

All multiuser applications embody the concept of a user session. Each user interacts with the application via a separate user session. The application keeps track of all who are currently using the application via sessions. This capability is essential for segregating user activity.

Despite rapid changes in Web server technology, the HTTP protocol remained the same. Currently, HTTP 1.1 is still the most widely used HTTP protocol. The greatest hurdle in designing and hosting Web-based applications is to get around the statelessness of HTTP. There are no standards governing how a Web-based application should provide its own state-maintaining mechanism over HTTP. Developers tackle state preservation in different ways. There are poor and good ways of approaching this problem, although both approaches result in a workable application. The poor ways of implementing session states lead to attacks such as session hijacking.

Web and Database Port Listing


Table A-1. HTTP/1.1 Methods and Field Definitions Web and Database Port Listing
Port
Server
66
Oracle SQL*Net
80
Hyper Text Transfer Protocol (HTTP)
81
HTTP Proxy, Alternative HTTP Port, Cobalt Server Administration Port
443
Secure Socket Layer (SSL)
445
Microsoft SQL Server over NetBIOS
457
UnixWare/Netscape FastTrack Server
1080
SOCKS Proxy
1100
Oracle WebCache Listener
1241
KaZaA File Sharing Server (HTTP-like protocol)
1352
Lotus Domino (Notes)
1433
Microsoft SQL Server 2000
1434
Microsoft SQL Server over TCP/IP Redirector
1521–1530
Oracle
1944
Microsoft SQL Server 7
2301
Compaq Insight Manager, Compaq Survey Utility
3128
HTTP Proxy (Squid, NetCache, etc.)
3306
mySQL
4000
Oracle WebCache Listener
4001
Oracle WebCache Listener
4002
Oracle WebCache Listener
4100
Sybase 11.0 (jConnect)
5000
Sybase 12.x
5432
PostgreSQL
5800
VNC HTTP Console Port #1
5801
VNC HTTP Console Port #2
5802
VNC HTTP Console Port #3
6346
Gnutella (HTTP-like protocol)
6347
Gnutella (HTTP-like protocol)
7001
BEA WebLogic
7002
BEA WebLogic
8000
HTTP Proxy, Alternative HTTP Port, HP Web JetAdmin Version 6.0
8001
BEA WebLogic
Port
Server
8005
Apache Tomcat Administration Server (non-HTTP protocol)
8080
HTTP Proxy, Alternative HTTP Port
8888
HTTP Proxy, Alternative HTTP Port
30821
Netscape Enterprise Server Administration Server


Top website design tips

website programmers should be to make the website experience as easy and pleasant for the user as possible. Clearly, well-designed pages with easily navigable layout are central to this, but they're not the whole story. We can go one step further by learning about our users and using information gained about them to personalize the website.

For example, imagine a user, whose name we asked on the first visit, returns to our website. We could welcome the user back to the website by greeting him or her by name. Another good example is given by a website, such as Amazon's, which incorporates the one-click purchasing system. By already knowing the user's purchasing details, such as credit card number and delivery address, we can allow the user to go from viewing a book to buying it in just one click, making the likelihood of the user purchasing it that much greater. Also, based on information, such as the previous purchases and browsing patterns of the user, it's possible to make book suggestions to the user.

Such personalization on websites requires that information about users be stored somewhere in between their visits to the website. We've previously talked about the fact that accessing the user's local file system from a web application is pretty much off limits due to security restrictions included in browsers. However, we, as website developers, can store small amounts of information in a special place on the user's local disc, using what is called a cookie. There may be a logical reason why they are named cookies.

The term Dynamic HTML DHTML has rather a loose meaning, but essentially its purpose is to allow the elements and contents of a web page to be dynamically changed after the page has been loaded into the browser. For example, it can be used to change the size of text as the mouse pointer rolls over it. However, in addition, it also aims to enhance user interaction by making many more HTML elements respond to user actions.

In plain HTML, we can define what a page will contain and the appearance of its contents. However, after the page is built and downloaded to the user's browser, that's it. No changes can be made to the page's content or appearance. However, using DHTML we can change the appearance of existing content, add new content, and even remove content.


EMAIL BULK SERVICE


Email marketing is a powerful channel but also one that presents many
questions and difficulties. In their 2012 Email marketing benchmark,
marketingsherpa surveyed 2,735 companies and asked them to rank the
significance of 12 common email marketing challenges. In this chapter, we
will focus on the top five challenges and suggest some ideas through which
you can address these issues.


marketers want to amass valuable data across their different channels. For
instance, they might like to see the possible relationships between landing pages
and emails or to track the sales process of an email conversion. In addition to the
obvious reporting benefits such integration provides, it also opens the door to a
much more enjoyable experience for email subscribers.


Just think about it--if you could bridge the gap between email marketing
performance and social media activities, landing page conversions or new
customer acquisitions, you are that much closer to optimizing your sales funnel
and delivering content that your community loves.

In order to integrate your email marketing with your other data systems, you
need to use marketing softwarethat allows for that integration to take place.
In fact, integration is the foundation on which Hubspot’s softwarewas built
as it connects sEo, blogging, lead management and reporting with email
marketing and lead nurturing.

combining your different marketing databases allows for clear segmentation
and ability to better target your customers and prospects with relevant email
messages. once you have access to an integrated marketing system, keep
your buyer persona in mind and focus on the opportunity to target the right
audience with the right message.

the more targeted your email campaigns, the more content you’ll need. key to
promoting relevant content in email is to provide an offer that is connected to
the initial request. what action have your contacts taken on (or even off) your
website? Offer them content that fits with their intent and their needs.


to grow their email database, marketers sometimes purchase lists. this
practice will surely get you into trouble: it might add invalid addresses to your
list and thus pollute your entire database. Even if the addresses you acquired
are valid, the new recipients will most likely not be interested in your content
and either unsubscribe or not engage with your emails altogether. both of
these alternatives are undesirable.


to retain subscribers, a lot of companies send fewer emails, thinking that the
communication frequency might in some way define engagement. Rarity of
emails means they are more special, right? wrong. Frequency of emailing,
as we have established in our science of Email marketingresearch, doesn’t
necessarily negatively impact subscriber retention.

purchase domains

Domain Names | Register Your Domain Name In India - GoDaddy
in.godaddy.com/
GoDaddy makes registering Domain Names fast, simple, and affordable. Find out why so many business owners chose GoDaddy to be their Domain Name Registrar.
 
Domain Name Registration and Web Hosting | Domain.com
www.domain.com/
Register a domain name and transfer domains. Reliable web hosting and VPS. Powerful website, blog, and ecommerce tools. 12 years, millions of customers.
 
Buy Domain Names- Choose a Premium Domain and Open Your Doors ...
www.buydomains.com/
Make it Your Domain. Your website is the face of your business. Choosing a Premium Domain will give you instant recognition with your customers.
 
Domain Names | The World's Largest Domain Name Registrar - Go ...
www.godaddy.com/
Go Daddy offers everything you need to make a name for yourself on the Web, from domain names and website builders to complete eCommerce solutions.
 
Buy domains quickly and easily now at Sedo
sedo.com/us/buy-domains/buy-domains-overview/
Buy domains through Sedo, the world’s largest domain marketplace. Search over 15 million names listed for sale to find your perfect domain!
 
Domain Registration | Domain Name Registration Services ...
www.net4.in/net4app/aspx/domains/searchDomain.aspx
Just check domain name availability and buy domain names fast and simple with Net4. Forgot Password. Register. Login / Register +91-120-4989000 Toll Free
 
.IN Domain Registration | Buy Domain Name – BigRock.in
www.bigrock.in/domain-registration/
Buy .in Domain Names and other Domain Extensions at best prices at BigRock. Register a Domain now and build your online presence.
 
Active-Domain.com - Domain Names from $2.85: Register & Buy ...
www.active-domain.com/
Buy domain registration service from $2.85 with free hosting services. Register domain name or transfer internet web site registration at affordable cost.
 
Domain Name, Domain Name Registration, Register Domain Name ...
www.buydomainname.in/
We are amongst the most reputed domain name registration companies which provide register domain name service at affordable prices.Buy Domain, Buy Domain Name,

BUSINESS TLD B2B - Buy Domains - Premium Domain Names
buydomains.com.co/
Buy Domains The Specialist of business domain names with great potential...
 
eNom - domain name, web site hosting, email, registration
https://www.enom.com/
eNom, Inc., the #1 Reseller Registrar, ICANN accredited - Domain name registration, Web Site Hosting, Email Services, Club Drop and Web Site Monitor.
 
Buy & Sell Domains - Domain Name Auction • Namecheap
https://www.namecheap.com/domains/marketplace/buy-domains.aspx
Buy domains from the Namecheap Marketplace. Find interesting domains at good prices or negotiate a price with the seller. Search today!

voip test

VoIP Speed, Bandwidth, and Jitter Test | WhichVoIP.com
Free VoIP speed test tool that performs a bandwidth test, jitter test, and a packet loss
 test on your Internet connection to determine VoIP compatibility.


Internet Connection Speed Test - voip-info.org
For VoIP to work correctly, you must have a strong and consistent Internet connection.
The quality of VoIP calls depends on the speed of your internet.



ISPGeeks.com - Broadband Speed Test - Internet Speed ...
Broadband Speed Test and benchmark for Cable, DSL, Fios, Satellite - VOIP, IPTV, TCP/IP Tests
 plus Network Diagnostic Tools, Forums and Technical Support.

website domain names

Web Hosting - UK Website Hosting and Domain Names - LCN.com
Buy reliable UK web hosting packages, powerful server solutions, and great value domain names
from LCN.com. UK based technical support on hand 7 days a week.

Domain Name Registration and Web Hosting | Domain.com
Register a domain name and transfer domains. Reliable web hosting and VPS. Powerful website,
 blog, and ecommerce tools. 12 years, millions of customers.



Name.com - Domain Names | Search, Registration, SSL
Search & register domain names along with web hosting, SSL certificates, website builders,
premium & expired domain names. We are an ICANN accredited registrar.


Melbourne IT - Domain Registration | Web Design | Web Hosting
As Australia's first domain name registration company, Melbourne IT is a world leader in domain
registration, website design, email and web hosting.


SiberName - Canadian .ca Domain Name Registrations
Are you looking for Canadian domain names with affordable web hosting? Sibername.com specializes
 in providing affordable web hosting, cheap domain names, domain name .



Web Hosting & Domain Names - Doteasy.com
Get 100GB SSD storage, unlimited data transfer, and email accounts starting at just $4.95/month.
 Free domain included. Try it with our 30-day money back guarantee.


Register Domain Names at Register.com - Business Web ...
Register.com offers domain name registration, web hosting, website design and online marketing
 - all in one place. Award-winning customer service 24/7 .


uk-cheapest.co.uk - Cheap Domain Names | Cheap Web Hosting ...
Register domain names and web hosting from one of UK's best cheap domain names providers.
 Everything you need to get your web site online. Free DNS manager and email.

hosting server

Web Hosting
free web hosting-free hosting 12:15 Web hosting Awardspace is a free web hosting provider with no ads, paid web hosting, vpshosting, reseller hosting, domain name registration and ssl certificates. 0catch.com - free and affordable hosting plans for business and search results. Ucoz - free website builder make your own website with free free web hosting probably the most reliable free webhosting provider hosting over 1 000 000 customers greatnow - free webhost cheap domains, starting at $3 99. Hostgator - webhosting services, reseller hosting, vps hosting free web hosting services from 50megs.com web hosting for business and personal websites advantages of web hosting services from 50megs.com. Free web hosting services -- 50megs.com a web hosting service is a type of internet hosting service.
Free Hosting
Free Hosting 05:35 Web Hosting Biz.ly Free Hosting Get 100MB of Free Web space, a free file manager, free online Website editor, UNLIMITED bandwidth and more when you register with Biz.ly's free website Hosting service. They also offer free sub-domains, so your URL (Web address) will look like "yourname. Free Webhosts Directory Searchable database directory of over 1,200 free webspace hosts with reviews and ratings. web-Hosting-choices Both free webHosting, dedicated servers and affordable web Hosting can be found here. Freewebspace FreeWebspace.net is the largest searchable guide to free webspace providers. Perfect Free Web Hosting50Mb web space, 1Gb bandwidth, free sub-domain, free FTP access, no banners ads, PHP, CGI, Perl, SSI, free.
top 50 free web hosting site
top 50 free web hosting site 23:43 top listed site , Web hosting With thousands of web hosting services from companies available today, the choice of a web hosting service to signed contract with, can be a difficult experience. It is not as easy as going to a store and buy something. For many of us, it is like a grope in the dark. You need the following tips to guide you in your decisions. Will your website be available 24/7 and 365 days in a year? This is called server uptime and a successful website should have an uptime of 98% to 99%. Any value below this is just unacceptable. Visitors are not going to visit your website again if it is unaccessible most of the time. If your website's storage capacity is very small, then your visitors cannot interact much with it. If your website has.
MySQL Server Performance
MySQL Server Performance 08:10 MySQL To make things easier for administrators. Minimal memory, relatively infrequent MySQL usage: my-small.cnf Minimal memory combined with reliance on MySQL, or larger memory for a multipurpose system: my-medium.cnf Large memory Server dedicated primarily to MySQL: my-large.cnf Very large memory Server completely dedicated to MySQL: my-huge.cnf It's worth your time to review these files, if for no other reason than to gain some ideas on the optimal ratios between the various Server settings. Connectivity Memory management Application control User resource control Email This BlogThis! Share to Twitter Share to Facebook Share to Pinterest Newer.
  Cost effective-vps

What Is IP Filtering?

IP filtering is simply a mechanism that decides which types of IP packets will be processed normally and which will be dropped or rejected. By dropped we mean that the packet is deleted and completely ignored, as if it had never been received. By rejected we mean that the firewall sends an ICMP response to the sender indicating a reason why the packet was rejected. You can apply many different sorts of criteria to determine which packets you wish to filter. Some examples of these are:
  • Protocol type: TCP, UDP, ICMP, etc.
  • Port number (for TCP/UPD)
  • Packet type: SYN/ACK, data, ICMP Echo Request, etc.
  • Packet source address: where it came from
  • Packet destination address: where it is going to
It is important to understand at this point that IP filtering is a network layer facility. This means that it doesn't understand anything about the application using the network connections, only about the connections themselves. For example, you may deny users access to your internal network on the default Telnet port, but if you rely on IP filtering alone, you can't stop them from using the Telnet program with a port that you do allow to pass through your firewall. You can prevent this sort of problem by using proxy servers for each service that you allow across your firewall. The proxy servers understand the application that they were designed to proxy and can therefore prevent abuses, such as using the Telnet program to get past a firewall by using the World Wide Web port. If your firewall supports a World Wide Web proxy, outbound Telnet connections on the HTTP port will always be answered by the proxy and will allow only HTTP requests to pass. 

The IP filtering rule set is made up of many combinations of the criteria listed previously. For example, let's imagine that you wanted to allow World Wide Web users within the Virtual Brewery network to have no access to the Internet except to use other sites' web servers. You would configure your firewall to allow forwarding of the following:
  • Packets with a source address on Virtual Brewery network, a destination address of anywhere, and with a destination port of 80 (WWW)
  • Packets with a destination address of Virtual Brewery network and a source port of 80 (WWW) from a source address of anywhere
Note that we've used two rules here. We have to allow our data to go out, but also the corresponding reply data to come back in. In practice, as we'll see in the chapter on IP masquerade and Network Address Translation

What is Internet domain?

Internet Domains

 In database design and management, the set of valid values for a given attribute. For example, the domain for the attribute AREA-CODE might be the list of all valid three-digit numeric telephone area codes in the United States.  For Windows NT Advanced Server, a collection of computers that share a common domain database and security policy. Each domain has a unique name. 3. In the Internet and other networks, the highest subdivision of a domain name in a network address, which identifies the type of entity owning the address for example, .com for commercial users or .edu for educational institutions) or the geographical location of the address for example, .fr for France or .sg for Singapore. The domain is the last part of the address for example, www.example.org. 



Top-Level Domains: Organizational

Domain Type of Organization
.aero Air-transport industry
.biz Businesses
.com Commercial
.coop Cooperatives
.edu Educational
.gov Nonmilitary agency, United States federal government
.info Unrestricted use
.int International organization
.mil United States military
.museum Museums
.name Individuals
.net Network provider
.org Nonprofit organization
.pro Professional workers
Top-Level Domains: Geographic
Domain Country/Region
.ac Ascension Island
.ad Andorra
.ae United Arab Emirates
.af Afghanistan
.ag Antigua and Barbuda
.ai Anguilla
.al Albania
.am Armenia
.an Netherlands Antilles
.ao Angola
.aq Antarctica
.ar Argentina
.as American Samoa
.at Austria
.au Australia
.aw Aruba
.az Azerbaijan
.ba Bosnia and Herzegovina
.bb Barbados
.bd Bangladesh
.be Belgium
.bf Burkina Faso
.bg Bulgaria
.bh Bahrain
.bi Burundi
.bj Benin
.bm Bermuda
.bn Brunei
.bo Bolivia
.br Brazil
.bs Bahamas, The
.bt Bhutan
.bv Bouvet Island
.bw Botswana
.by Belarus
.bz Belize
.ca Canada
.cc Cocos (Keeling) Islands
.cd Congo (DRC)
.cf Central African Republic
.cg Congo
.ch Switzerland
.ci Côte d‘Ivoire
.ck Cook Islands
.cl Chile
.cm Cameroon
.cn China
.co Colombia
.cr Costa Rica
.cu Cuba
.cv Cape Verde
.cx Christmas Island
.cy Cyprus
.cz Czech Republic
.de Germany
.dj Djibouti
.dk Denmark
.dm Dominica
.do Dominican Republic
.dz Algeria
.ec Ecuador
.ee Estonia
.eg Egypt
.er Eritrea
.es Spain
.et Ethiopia
.fi Finland
.fj Fiji Islands
.fk Falkland Islands (Islas Malvinas)
.fm Micronesia
.fo Faroe Islands
.fr France
.ga Gabon
.gd Grenada
.ge Georgia
.gf French Guiana
.gg Guernsey
.gh Ghana
.gi Gibraltar
.gl Greenland
.gm Gambia, The
.gn Guinea
.gp Guadeloupe
.gq Equatorial Guinea
.gr Greece
.gs South Georgia and the South Sandwich Islands
.gt Guatemala
.gu Guam
.gw Guinea-Bissau
.gy Guyana
.hk Hong Kong SAR
.hm Heard Island and McDonald Islands
.hn Honduras
.hr Croatia
.ht Haiti
.hu Hungary
.id Indonesia
.ie Ireland
.il Israel
.im Man, Isle of
.in India
.io British Indian Ocean Territory
.iq Iraq
.ir Iran
.is Iceland
.it Italy
.je Jersey
.jm Jamaica
.jo Jordan
.jp Japan
.ke Kenya
.kg Kyrgzstan
.kh Cambodia
.ki Kiribati
.km Comoros
.kn St. Kitts and Nevis
.kp North Korea
.kr Korea
.kw Kuwait
.ky Cayman Islands
.kz Kazakhstan
.la Laos
.lb Lebanon
.lc St. Lucia
.li Liechtenstein
.lk Sri Lanka
.lr Liberia
.ls Lesotho
.lt Lithuania
.lu Luxembourg
.lv Latvia
.ly Libya
.ma Morocco
.mc Monaco
.md Moldova
.mg Madagascar
.mh Marshall Islands
.mk Macedonia, Former Yugoslav Republic of
.ml Mali
.mm Myanmar
.mn Mongolia
.mo Macau SAR
.mp Northern Mariana Islands
.mq Martinique
.mr Mauritania
.ms Montserrat
.mt Malta
.mu Mauritius
.mv Maldives
.mw Malawi
.mx Mexico
.my Malaysia
.mz Mozambique
.na Namibia
.nc New Caledonia
.ne Niger
.nf Norfolk Island
.ng Nigeria
.ni Nicaragua
.nl Netherlands, The
.no Norway
.np Nepal
.nr Nauru
.nu Niue
.nz New Zealand
.om Oman
.pa Panama
.pe Peru
.pf French Polynesia
.pg Papua New Guinea
.ph Philippines
.pk Pakistan
.pl Poland
.pm St. Pierre and Miquelon
.pn Pitcairn Islands
.pr Puerto Rico
.ps Palestinian Authority
.pt Portugal
.pw Palau
.py Paraguay
.qa Qatar
.re Reunion
.ro Romania
.ru Russia
.rw Rwanda
.sa Saudi Arabia
.sb Solomon Islands
.sc Seychelles
.sd Sudan
.se Sweden
.sg Singapore
.sh St. Helena
.si Slovenia
.sj Svalbard and Jan Mayen
.sk Slovakia
.sl Sierra Leone
.sm San Marino
.sn Senegal
.so Somalia
.sr Suriname
.st São Tomé and Príncipe
.sv El Salvador
.sy Syria
.sz Swaziland
.tc Turks and Caicos Islands
.td Chad
.tf French Southern and Antarctic Lands
.tg Togo
.th Thailand
.tj Tajikistan
.tk Tokelau
.tm Turkmenistan
.tn Tunisia
.to Tonga
.tp East Timor
.tr Turkey
.tt Trinidad and Tobago
.tv Tuvalu
.tw Taiwan
.tz Tanzania
.ua Ukraine
.ug Uganda
.uk United Kingdom
.um U.S. Minor Outlying Islands
.us United States
.uy Uruguay
.uz Uzbekistan
.va Vatican City
.vc St. Vincent and the Grenadines
.ve Venezuela
.vg Virgin Islands, British
.vi Virgin Islands
.vn Vietnam
.vu Vanuatu
.wf Wallis and Futuna
.ws Samoa
.ye Yemen
.yt Mayotte
.yu Yugoslavia
.za South Africa
.zm Zambia
.zw Zimbabwe

Why B2B website needed?

Short for business-to-business. The electronic exchange of products and services between businesses without the direct involvement of consumers. B2B’s effects on business include streamlining purchasing, accounting, and other administrative functions; lowering transaction costs; and simplifying the sale of excess inventory. Related businesses have collaborated on the creation of Internet-based supply-chain networks. 

B2c:The direct electronic exchange of products and services between businesses and consumers. B2C’s effects on business include improving the efficiency in delivering goods and services to consumers.

What is ActiveX

A set of technologies that enables software components to interact with one another in a networked environment, regardless of the language in which the components were created. ActiveX, which was developed by Microsoft in the mid 1990s and is currently administered by the Open Group, is built on Microsoft’s Component Object Model (COM). Currently, ActiveX is used primarily to develop interactive content for the World Wide Web, although it can be used in desktop applications and other programs. ActiveX controls can be embedded in Web pages to produce animation and other multimedia effects, interactive objects, and sophisticated applications. 

ActiveX control : A reusable software component based on Microsoft’s ActiveX technology that is used to add interactivity and more functionality, such as animation or a popup menu, to a Web page, applications, and software development tools. An ActiveX control can be written in any of a number of languages, including Java, C++, and Visual Basic. See also ActiveX. Compare helper program.

What is Active Server?

The server-based component of Microsoft’s Active Platform. Comprised of a set of technologies that includes DCOM (distributed component object model), Active Server Pages, Microsoft Transaction Server, and message queues, Active Server provides support for developing component-based, scalable, high-performance Web applications on Microsoft Windows NT servers. Active Server is designed to allow developers to concentrate on creating Internet and intranet software in a variety of languages without having to focus on the intricacy of the network itself. See also Active Desktop, Active Platform, Active Server Pages, ActiveX..

Active Server Pages :-. A Web-oriented technology developed by Microsoft that is designed to enable server-side (as opposed to client-side) scripting. Active Server Pages are text files that can contain not only text and HTML tags as in standard Web documents, but also commands written in a scripting language (such as VBScript or JavaScript) that can be carried out on the server. This server-side work enables a Web author to add interactivity to a document or to customize the viewing or delivery of information to the client without worrying about the platform the client is running. All Active Server Pages are saved with an .asp extension and can be accessed like standard URLs through a Web browser, such as Microsoft Internet Explorer or Netscape Navigator. When an Active Server Page is requested by a browser, the server carries out any script commands embedded in the page, generates an HTML document, and sends the document back to the browser for display on the requesting (client) computer. Active Server Pages can also be enhanced and extended with ActiveX components.

Abstract data type


In programming, a data set defined by the programmer in terms
 of the information it can contain and the operations that can be performed
 with it. An abstract data type is more generalized than a data type
constrained by the properties of the objects it contains—for example,
the data type “pet” is more generalized than the data types.

 The standard example used in illustrating an abstract data type is the
stack, a small portion of memory used to store information, generally on
 a temporary basis. As an abstract data type, the stack is simply a
structure onto which values can be pushed added and from which they
can be popped removed. The type of value, such as integer, is irrelevant
 to the definition.The way in which the program performs operations on
abstract data types is encapsulated, or hidden, from the rest of the program.
 Encapsulation enables the programmer to change the definition of the data
 type or its operations without introducing errors to the existing code
that uses the abstract data type. Abstract data types represent an intermediate
step between traditional programming and object-oriented programming.

The use of specialized software, such as an application programming interface
API, as a means of shielding software from device dependencies or the
complexities of underlying software. For instance, hardware abstraction
enables programs to focus on a task, such as communications, instead of on
individual differences between communications devices.


In object-oriented programming, the process of reducing an object to its
 essence so that only the necessary elements are represented.


Abstraction defines an object in terms of its properties attributes,
behaviors functionality, and interface means of communicating
with other objects.